James Gannon
Encyclopedia
James Gannon is a freelance writer and producer of documentaries for NBC News
. He has published articles in a variety of subjects and venues.
He is the author of Stealing Secrets, Telling Lies: How Spies
and Codebreakers Helped Shape the Twentieth century (2001). The book discusses, clearly and accurately, key episodes of 20th-century espionage
and cryptology involving the Zimmermann telegram
; Enigma decryption
and "Ultra
"; the Battle of the Atlantic; Erwin Rommel
; the Colossus computer
; Frank Rowlett
and Japan
's Purple
cipher
; Allied Operation Overlord
deceptions; World War II spies and spy organizations; Rudolf Roessler
and the Lucy Spy Ring
; Takeo Yoshikawa
and Japan's attack on Pearl Harbor
; Joseph J. Rochefort and the Battle of Midway
; Richard Sorge
; Donald Maclean; Klaus Fuchs
; Venona; Oleg Penkovsky
; and Ryszard Kukliński
.
A thread through Gannon's book is the ubiquity of distortions in accounts of espionage
and cryptology, and the readiness of unscrupulous individuals, agencies and countries to take credit for the achievements of others.
NBC News
NBC News is the news division of American television network NBC. It first started broadcasting in February 21, 1940. NBC Nightly News has aired from Studio 3B, located on floors 3 of the NBC Studios is the headquarters of the GE Building forms the centerpiece of 30th Rockefeller Center it is...
. He has published articles in a variety of subjects and venues.
He is the author of Stealing Secrets, Telling Lies: How Spies
Espionage
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...
and Codebreakers Helped Shape the Twentieth century (2001). The book discusses, clearly and accurately, key episodes of 20th-century espionage
Espionage
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...
and cryptology involving the Zimmermann telegram
Zimmermann Telegram
The Zimmermann Telegram was a 1917 diplomatic proposal from the German Empire to Mexico to make war against the United States. The proposal was caught by the British before it could get to Mexico. The revelation angered the Americans and led in part to a U.S...
; Enigma decryption
Cryptanalysis of the Enigma
Cryptanalysis of the Enigma enabled the western Allies in World War II to read substantial amounts of secret Morse-coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from other decrypted Axis radio...
and "Ultra
Ultra
Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by "breaking" high-level encrypted enemy radio and teleprinter communications at the Government Code and Cypher School at Bletchley Park. "Ultra" eventually became the standard...
"; the Battle of the Atlantic; Erwin Rommel
Erwin Rommel
Erwin Johannes Eugen Rommel , popularly known as the Desert Fox , was a German Field Marshal of World War II. He won the respect of both his own troops and the enemies he fought....
; the Colossus computer
Colossus computer
Not to be confused with the fictional computer of the same name in the movie Colossus: The Forbin Project.Colossus was the world's first electronic, digital, programmable computer. Colossus and its successors were used by British codebreakers to help read encrypted German messages during World War II...
; Frank Rowlett
Frank Rowlett
Frank Byron Rowlett was an American cryptologist.Rowlett was born in Rose Hill, Virginia and attended Emory & Henry College in Emory, Virginia, where he was a member of the Beta Lambda Zeta fraternity. In 1929 he received a bachelor's degree in mathematics and chemistry...
and Japan
Japan
Japan is an island nation in East Asia. Located in the Pacific Ocean, it lies to the east of the Sea of Japan, China, North Korea, South Korea and Russia, stretching from the Sea of Okhotsk in the north to the East China Sea and Taiwan in the south...
's Purple
Purple
Purple is a range of hues of color occurring between red and blue, and is classified as a secondary color as the colors are required to create the shade....
cipher
Cipher
In cryptography, a cipher is an algorithm for performing encryption or decryption — a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. In non-technical usage, a “cipher” is the same thing as a “code”; however, the concepts...
; Allied Operation Overlord
Operation Overlord
Operation Overlord was the code name for the Battle of Normandy, the operation that launched the invasion of German-occupied western Europe during World War II by Allied forces. The operation commenced on 6 June 1944 with the Normandy landings...
deceptions; World War II spies and spy organizations; Rudolf Roessler
Rudolf Roessler
In World War II espionage, Rudolf Roessler was the central figure in the Lucy spy ring. He was a German refugee who had moved to Switzerland in 1933, and was the proprietor of a small publishing firm in Switzerland, Vita Novi...
and the Lucy Spy Ring
Lucy spy ring
In World War II espionage, the Lucy spy ring was an anti-German operation that was headquartered in Switzerland. It was run by Rudolf Roessler, a German refugee and ostensibly the proprietor of a small publishing firm, Vita Nova...
; Takeo Yoshikawa
Takeo Yoshikawa
was a Japanese spy in Hawaii before the attack on Pearl Harbor on December 7, 1941.-Early career:A 1933 graduate of the Imperial Japanese Naval Academy at Etajima , Yoshikawa served briefly at sea aboard the armored cruiser Asama as well as submarines and had begun training as a naval pilot near...
and Japan's attack on Pearl Harbor
Pearl Harbor
Pearl Harbor, known to Hawaiians as Puuloa, is a lagoon harbor on the island of Oahu, Hawaii, west of Honolulu. Much of the harbor and surrounding lands is a United States Navy deep-water naval base. It is also the headquarters of the U.S. Pacific Fleet...
; Joseph J. Rochefort and the Battle of Midway
Battle of Midway
The Battle of Midway is widely regarded as the most important naval battle of the Pacific Campaign of World War II. Between 4 and 7 June 1942, approximately one month after the Battle of the Coral Sea and six months after Japan's attack on Pearl Harbor, the United States Navy decisively defeated...
; Richard Sorge
Richard Sorge
Richard Sorge was a German communist and spy who worked for the Soviet Union. He has gained great fame among espionage enthusiasts for his intelligence gathering during World War II. He worked as a journalist in both Germany and Japan, where he was imprisoned for spying and eventually hanged....
; Donald Maclean; Klaus Fuchs
Klaus Fuchs
Klaus Emil Julius Fuchs was a German theoretical physicist and atomic spy who in 1950 was convicted of supplying information from the American, British and Canadian atomic bomb research to the USSR during and shortly after World War II...
; Venona; Oleg Penkovsky
Oleg Penkovsky
Oleg Vladimirovich Penkovsky, codenamed HERO ; April 23, 1919, Vladikavkaz, North Ossetia, Soviet Russia, – May 16, 1963, Soviet Union), was a colonel with Soviet military intelligence in the late 1950s and early 1960s who informed the United Kingdom and the United States about the Soviet Union...
; and Ryszard Kukliński
Ryszard Kuklinski
Ryszard Jerzy Kukliński was a Polish colonel, Cold War spy and whistleblower. He passed top secret Warsaw Pact documents to the CIA between 1971 and 1981...
.
A thread through Gannon's book is the ubiquity of distortions in accounts of espionage
Espionage
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...
and cryptology, and the readiness of unscrupulous individuals, agencies and countries to take credit for the achievements of others.